Officialize.app Mac Virus
Officialize.app is a deceptive application that targets macOS systems and is known for generating intrusive ads and making unauthorized changes to…
Bezant.app
Bezant.app is a deceptive adware application targeting macOS users. Linked to the notorious Pirrit malware family, it infiltrates systems through…
Porn300.com
Porn300.com is a known adult entertainment website that often attracts users with its large library of free explicit content. However,…
Kurepos.co.in
Kurepos.co.in is a deceptive website that bombards users with intrusive browser notifications and redirects them to potentially harmful content. This…
ARROW Ransomware
ARROW ransomware is a malicious encryption-based virus that locks user files and demands a ransom in exchange for a decryption…
Skitnet Malware (Bossnet)
Skitnet, also known as Bossnet, is a sophisticated multi-stage backdoor malware developed by the threat actor LARVA-306. First observed in…
MaksStealer
MaksStealer is a stealthy information-stealing Trojan that masquerades as a performance enhancement tool or cheat modification for Hypixel SkyBlock, a…
PANDA Ransomware
PANDA ransomware is a dangerous file-locking malware that encrypts your personal data and demands a massive ransom in exchange for…
.TXTME Ransomware
TXTME ransomware is a new and highly aggressive variant of the Dharma ransomware family. This file-locking malware encrypts critical files,…
Hilipinge.com Notifications
Hilipinge.com is a deceptive website that tricks users into enabling intrusive push notifications. Once permission is granted, it aggressively delivers…
Bequalmal.com
Bequalmal.com is a deceptive website that tricks users into enabling push notifications using misleading prompts such as "Click Allow to…
Appriating.com
Appriating.com is a deceptive website that functions as a browser hijacker, often categorized as a Potentially Unwanted Program (PUP). Once…
Snescouremast.com
Snescouremast.com is a deceptive website that manipulates users into subscribing to its push notifications. By presenting misleading prompts, such as…
MARK (Makop) Ransomware
The MARK ransomware is a malicious program that encrypts files on infected systems, rendering them inaccessible until a ransom is…
Blaze Browser Unwanted Application
Blaze Browser presents itself as a legitimate web browser but is, in reality, a potentially unwanted application (PUA) that poses…
DrTuber.com Ads Virus
If you're being constantly redirected to DrTuber.com or bombarded with pop-up ads linked to this domain, your computer is likely…
Recipio Adware
Recipio presents itself as a browser extension designed to assist users in finding recipes online by narrowing search results to…
Desolator Ransomware (.desolated)
Desolator ransomware is a newly identified file-encrypting malware that appends the ".desolated" extension to compromised files and demands a ransom…
pphouse3.fun
The "Ads by pphouse3.fun" issue is a browser-based nuisance that bombards users with intrusive pop-up advertisements and notifications. These ads…
Dance of Hillary Malware
The "Dance of Hillary" malware is a deceptive Trojan horse that has recently resurfaced, targeting users through social media platforms…
Chihuahua Stealer
A Sophisticated .NET-Based Infostealer Targeting Browsers and Cryptocurrency Wallets Chihuahua Stealer is a newly identified .NET-based information-stealing malware that poses a…
Tasksche.exe Malware
The tasksche.exe file is a malicious executable associated with the infamous WannaCry ransomware. Disguised as a legitimate Windows process, it serves as…
TransferLoader
TransferLoader is a newly identified malware loader that poses a significant threat to cybersecurity. First detected in early 2025, this…
GovCrypt Ransomware
GovCrypt is a ransomware variant built on the Chaos ransomware framework. It encrypts files on compromised systems and appends the .govcrypt extension…
BackLock Ransomware (.backlock)
BackLock is a newly discovered ransomware strain that encrypts files on infected systems and demands payment for decryption. It appends…
ITSA Ransomware
ITSA ransomware is a newly identified file-encrypting malware strain that appends the ".itsa" extension to compromised files and demands a…
RALEIGHRAD Ransomware
RALEIGHRAD is a newly identified ransomware strain that encrypts victims' files and demands payment for decryption. It appends the ".RALEIGHRAD"…
LegionRoot Ransomware
LegionRoot ransomware is a newly identified file-encrypting malware that targets Windows systems. It encrypts users' files and demands a ransom…
Bbq Ransomware (.bbq46)
Bbq ransomware is a newly identified variant within the notorious Makop ransomware family. This malicious software encrypts victims' files and…
Nviqri Someq Utils Unwanted Application
A Dangerous Dropper for Legion Loader and Other Malware Nviqri Someq Utils is a deceptive application that poses a significant…
Pres Ransomware (.pres)
Pres ransomware is a recently discovered variant of the infamous Dharma ransomware family. It locks users out of their files…
Lyrix Ransomware
Lyrix ransomware is a newly identified file-encrypting malware that combines encryption with data theft. Once it infects a system, it…
LockZ Ransomware
LockZ ransomware is a destructive malware strain designed to encrypt files and extort victims for a ransom payment. Upon infection,…
AnarchyRansom Ransomware
AnarchyRansom is a dangerous ransomware variant that encrypts files on compromised systems and appends the .ENCRYPTED extension to them. It changes the…
Hyllates.co.in Ads
Hyllates.co.in is a deceptive website that acts as a browser hijacker, exploiting browser push notification features to deliver intrusive ads,…
SearchThatNow Browser Hijacker
SearchThatNow is a browser extension that masquerades as a tool to enhance web search experiences by providing quick access to…
TerraLogger Trojan Malware
TerraLogger is a stealth-based keylogger malware attributed to a sophisticated cybercriminal group. This malware is engineered to secretly monitor and record…
“Norton – Scan Your Windows PC For Viruses In Seconds” Pop-Up Scam
The "Norton - Scan Your Windows PC For Viruses In Seconds" pop-up scam is a deceptive browser-based attack designed to…
Mospross.co.in Ads
Mospross.co.in is a deceptive website that manipulates users into enabling browser notifications, leading to a barrage of intrusive ads and…
Total Safety Chrome Unwanted Extension
Total Safety for Chrome is a malicious browser extension that disguises itself as a helpful tool for managing and scanning…
CRFILE Ransomware (.CRFILE2 Files)
CRFILE ransomware is a newly identified variant from the MedusaLocker family. It encrypts user files and appends the ".CRFILE2" extension,…
Gremlin Stealer Malware
Gremlin Stealer is a newly identified information-stealing malware that surfaced in March 2025. Written in C#, this malicious program is…
PowerLocker Ransomware
PowerLocker is a newly identified ransomware strain that encrypts files using the robust AES-256 algorithm. It appends the ".PowerLocker" extension…
Protecto for Chrome Extension
The Protecto for Chrome extension poses as a legitimate browser enhancement but functions as a browser hijacker. Once installed, it alters browser…
Fake DeepSeek AI Chat Extension
The Fake DeepSeek AI Chat Extension is a dangerous browser hijacker that disguises itself as a helpful AI chatbot. Promoted under the…
MultSearch Browser Hijacker
MultSearch is a browser hijacker that stealthily infiltrates your system and takes control of critical browser settings. Once active, it…
OrbitingInsights.com Redirect Virus
OrbitingInsights.com is a browser hijacker that silently infiltrates your system and takes control of your web browser. Although it pretends…
Supessherse.co.in Ads
Supessherse.co.in is a deceptive website that exploits browser notification features to inundate users with intrusive advertisements. By masquerading as a legitimate…
SearchOnSite.com Redirect
The SearchOnSite.com redirect is a browser hijacker that forcibly alters browser settings to promote a fake search engine. Users affected by this threat often…
Numec Ransomware
The Numec ransomware is a recently discovered malicious program that encrypts victims' files and demands payment for their restoration. Like…

